Research Article

Security Evaluation Framework for Military IoT Devices

Table 5

Example of security control conversion into CC component.

ComponentsDescription

FIA_UAU.1Timing of authentication, allows a user to perform certain actions prior to the authentication of the user's identity.

FIA_UAU.2User authentication before any action, requires that users authenticate themselves before any action will be allowed by the TSF.

FIA_UID.1Timing of identification, allows users to perform certain actions before being identified by the TSF.

FIA_UID.1User identification before any action, require that users identify themselves before any action will be allowed by the TSF.